Partial CRC Checksum of SCTP for Error Control over Wireless Networks

Size: px
Start display at page:

Download "Partial CRC Checksum of SCTP for Error Control over Wireless Networks"

Transcription

1 Wireless Pers Commun (2009) 48: DOI /s Partial CRC Checksum of SCTP for Error Control over Wireless Networks Lin Cui Seok Joo Koh Published online: 20 June 2008 Springer Science+Business Media, LLC Abstract In the Stream Control Transmission Protocol (SCTP), when a portion of a packet is corrupted, the entire packet will be discarded at the receiver side. This may result in degradation of the throughput of SCTP over wireless networks with a high bit error rate. This paper proposes a new error control scheme of SCTP using a partial Cyclic Redundancy Check (CRC) checksum to enhance the throughput performance, in which a new checksum chunk is introduced to effectively identify any corruptions of data chunks contained in the SCTP packet. In the proposed scheme, an SCTP data packet can carry one or more data chunks depending on the channel condition, and the newly defined checksum chunk will contain the partial CRC checksums of the individual data chunks and/or the base header of the packet. By referring to these partial checksums, the receiver can discard only the corrupted data chunks, whereas the other available data chunks can be recovered. Simulation results show that the proposed scheme significantly provides better performance than the standard SCTP in the wireless networks. Keywords SCTP Corruption Checksum Partial CRC Wireless networks 1 Introduction The Stream Control Transmission Protocol (SCTP) [1] is originally designed for transport of Signaling System 7 (SS7) signaling messages over IP networks, and now has been extended as a general-purpose reliable transport layer protocol. Differently from Transport Control Protocol (TCP), the SCTP provides some unique features such as multi-streaming and multi-homing. The multi-streaming feature can be used to alleviate the head-of-line (HoL) blocking effect of TCP, where each stream within the overall data flow can be delivered L. Cui S. J. Koh (B) Department of Computer Science, Kyungpook National University, Daegu, Korea sjkoh@cs.knu.ac.kr L. Cui cuilin@cs.knu.ac.kr

2 248 L. Cui, S. J. Koh to the upper-layer application independently of the other streams [2,3]. The multi-homing feature allows the two endpoints to establish an association using multiple IP addresses. This feature can be used by SCTP endpoints to improve the efficiency of data transmissions by performing the primary path change in the face of a path failure [4 6], or by allowing a sender to transmit data to a multi-homed receiver through different destination addresses simultaneously [7 10]. On the other hand, the SCTP is designed based on the window-based error and congestion control [11]. As done in TCP, a corrupted packet is regarded as a loss and thus induces the retransmission request at the receiver side and the decrease of the congestion window at the sender side. This will cause the further degradation of SCTP throughput over wireless networks with a high bit error rate (BER). Several works have been done to improve the SCTP performance against corruption. The work in [12] introduces a MAC-Error-Warning (MEW) method with a new type of packet generated at Medium Access Control (MAC) layer. The MEW method is similar to the Automatic Request (ARQ) mechanism [13], but a special MAC packet is generated before a data packet is discarded, which contains the detailed information (including the stream ID and the sequence number) to notify the source of the failed transmission. Arriving at the transport layer, the MEW packet will be analyzed by the SCTP sender to trigger a fast retransmission of the data chunk without degrading the congestion window. The work in [14] utilizes the Explicit Congestion Notification (ECN) [15], which will be marked by an ECN-capable router in the network. Accordingly, a packet loss without an ECN message will be regarded as a non-congestion error, and the sender will execute a simple loss-recovery procedure without applying the normal congestion control mechanism. The same issues have also been addressed in a lot of literatures on TCP [16 21], among which as a feasible solution against link-level errors, the Forward Error Correction (FEC) scheme recently has attracted much attention and has been suggested for satellite channel [22]. The drawback of FEC is to consume some extra bandwidth to transmit the redundant information. On the other hand, the study in [23] shows that there is an optimal amount of redundancy to be added for performance enhancement. Moreover, with the rapidly increased usage of wireless devices all over the world, the faster and cheaper link level (e.g., ) mechanisms tend to be simple (e.g., s ARQ mechanism). This trend results in a high and variable residual erasure rate (e.g., 10 50% erasure rate observed by [24]) that needs to be ultimately handled in the end-to-end manner [16]. This paper deals with the SCTP error control over wireless network. This work is motivated from the observation that an SCTP segment can carry multiple data chunks but only a single overall checksum is used in its common header. Accordingly, on reception of an SCTP segment, if the checksum field indicates a corruption, the entire segment will be discarded even though only a portion of the multiple data chunks is corrupted during transmission. Therefore, if the receiver can recover the available (successfully received) data chunks from a corrupted SCTP segment, then the sender can be able to reduce the retransmission amount and to avoid the unnecessary halving congestion window incurred by corruptions, in particular, under the wireless network with a high BER. In this paper we propose a partial Cyclic Redundancy Check (CRC) checksum scheme so as to enhance the SCTP error control over wireless networks. In the proposed scheme, each data chunk contained in the SCTP segment can have its own checksum value that is used to detect a corruption on an individual chunk basis. To support this partial CRC checksum scheme, a new checksum chunk is introduced, and also the formats of the existing INIT/INIT-ACK and SACK chunks will be extended. The main intention of the proposed scheme is to reduce the amount of unnecessary retransmissions in addition to avoiding the

3 Partial CRC Checksum of SCTP 249 unwanted deflation of congestion window, by using a flexible chunk checksum policy over the wireless channels. In the proposed scheme, the two SCTP endpoints will negotiate each other about whether the partial CRC checksum is supported or not during the association establishment phase. This is done by using a newly defined parameter option contained in the INIT and INIT-ACK chunks. If the partial CRC checksum is supported, the SCTP sender can transmit variable data chunks with the corresponding checksum control chunk to the receiver depending on the channel condition. On the other hand, if the overall checksum in the common header for a segment fails (i.e., a corruption of the SCTP segment), the SCTP receiver will check whether each of the data chunks contained in the segment fails or not. This is done for the receiver by referring to the partial CRC checksum values of the associated checksum chunk. Through this checking process of partial checksums, some of the data chunks in the entire segment may be recovered as available data chunks, if any. Then, the receiver will deliver the successfully received in-order data to the upper layer in time. After that, the receiver will report the associated Transmission Sequence Numbers (TSNs) to the sender via the subsequent SACK chunks so as to indicate which data chunk is corrupted. The fast retransmission is requested, if necessary, without shrinking the congestion window. For this purpose, this paper also suggests an extension of the SACK chunk format. The core problem is that SCTP packets are often lost within the network due to failed link-layer (L2) CRCs, more often than at the end-node due to failed transport layer (L4) checksum. To let SCTP handle the corrupted packets with L4 checksum, two approaches can be considered. One is to disable the L2 CRC completely; the other is to set a skip flag in each packet s header for L2 CRC mechanism to skip them. The former may take the risk for other transport protocols to deliver some garbage to the application (e.g. TCP, since TCP employs 16-bit 1 s complement checksum which is relatively weaker than 32-bit CRC mechanism) and overload transport layer, the later needs a slight revision for L2 CRC mechanism to ignore the special packets with the skip flag. The rest of this paper is organized as follows. Section 2 describes the SCTP control chunks used to support the partial CRC checksum scheme, in which the formats of the INIT, INIT-ACK, and SCAK chunks are extended and a checksum chunk is newly defined. Section 3 describes the error control mechanism based on the proposed partial checksum scheme. Section 4 shows the experimental simulation results for the proposed scheme using the ns-2 networks simulator. Finally, we conclude this paper in Sect Extensions of SCTP Chunks for Partial CRC Checksum The proposed partial CRC checksum scheme is purposed to enhance the throughput performance of SCTP over wireless channels by differentiating a corruption of an individual data chunk from a corruption of the entire SCTP segment. For this purpose, the CRC checksums of individual data chunks will be calculated, in addition to the entire checksum of the SCTP common header. To support the proposed scheme, we need to define a new checksum control chunk. In addition, a new parameter option is defined and contained in the INIT and INIT-ACK chunks, and the SACK chunk format will also be extended. 2.1 Optional Parameter for INIT/INIT-ACK Chunks To apply the proposed scheme, the two SCTP endpoints need to negotiate the use of the partial CRC checksum scheme. To do this, in the SCTP association establishment phase, the sender

4 250 L. Cui, S. J. Koh Table 1 Optional parameters for SCTP Variable parameters Status Type value IPv4 address Already defined 5 IPv6 address Already defined 6 Cookie preservative Already defined 9 Reserved for ECN capable Already defined (0 8000) Host name address Already defined 11 Supported address types Already defined 12 Partial checksum chunk Newly defined 13 Fig. 1 SCTP INIT/INIT-ACK chunk with the partial checksum option and the receiver need to confirm whether or not to use the optional partial CRC checksum chunk and how many data chunks should be carried per segment over the association by exchanging the SCTP INIT and INIT-ACK chunks with the associated optional parameter. Table 1 lists all the optional parameters supported by the standard SCTP, together with a new parameter for the partial CRC checksum proposed in this paper. In the table, a new option parameter with the type value of 13 is assigned for the proposed partial CRC checksum scheme. The new optional parameter will be contained in the INIT and INIT-ACK chunks for the proposed checksum scheme. For example, Fig. 1 shows the INIT or INIT-ACK chunk that contains the partial checksum optional parameter. When both of the two SCTP endpoints support this option, the proposed scheme will be enabled in the end-to-end data transmission. 2.2 Checksum Chunk Once the proposed scheme is enabled between the two endpoints, the SCTP sender will transmit the data packets to the receiver. Each data packet can include one or more data chunks depending on the channel condition, and the newly defined checksum chunk will contain the information on the partial CRC checksums for the packet s header and the respective data chunks contained in the SCTP data packet if multiple data chunks are carried. In a data packet, the checksum chunk will be inserted with the chunk type of 15, next to the common header. Figure 2 illustrates the format of the proposed checksum chunk, which is designed based on the RFC2960 [1].

5 Partial CRC Checksum of SCTP 251 Fig. 2 Checksum chunk for the partial CRC checksum In the figure, each of the partial checksum items consists of the 4-byte checksum value field (e.g., CRC Checksum #1) and the 2-byte coverage length field (e.g., coverage length #1), which will be a total 6-byte in length. It is noted that the first partial checksum item is responsible for the checksum of a packet portion which covers from the beginning of the packet to the region indicated by the corresponding coverage length in byte.. Likewise, the second partial checksum is responsible for the checksum of the subsequent area of the packet which covers the associated coverage length (in byte) from the end of coverage area of the first partial checksum. Each of the partial CRC checksum items will be configured in this way. It is noted that the first partial checksum of the checksum chunk is responsible for the header portion that typically consists of the SCTP common header, checksum chunk, other control chunks, if any, as well as the first data chunk s header. The checksum chunk of a segment with only a single data chunk will include a single partial checksum. On the other hand, in the case of the checksum chunk of a segment with multiple data chunks, the respective partial checksums of the individual data chunks will be additionally inserted. For example, the checksum chunk for a segment with a single data chunk will be a 10-byte chunk (4-byte chunk header plus a 6-byte partial checksum item), which is called base checksum chunk in this paper, whereas the checksum chunk of the segment with two data chunks will be a 22-byte chunk, which corresponds to the 10-byte base checksum chunk plus the 12-byte additional checksum items for the two data chunks. 2.3 Extension of SACK Chunk When the SCTP destination receives the data packet with the checksum chunk from the source, it will first check whether the entire packet is corrupted or not. If the overall checksum fails, the receiver will decide whether or not each of the individual data chunks is corrupted by referring to the checksum chunk. Then, the integral data chunks will be recovered (if any), whereas the corrupted ones shall be notified to the sender. For this purpose, the receiver will respond with the SACK chunk to the sender, which contains the information on the TSNs of the associated data chunks together with the associated timestamp. Figure 3 shows the format of the extended SACK chunk proposed in this paper. In the figure, the later part of the SACK chunk is added to the existing SACK chunk so as to indicate which data chunks are corrupted.

6 252 L. Cui, S. J. Koh Fig. 3 Format of the extended SACK chunk In the figure, for each corrupted segment with a single data chunk, an associated corruption item is constructed with a corrupted chunk s TSN as well as a corresponding timestamp (called explicit corruption item in this paper), which is used to explicitly report a corrupted chunk to the sender. On the other hand, the corruption item for the corrupted segment with multiple data chunks, which is called implicit corruption item in this paper, can include one of the following two components: (1) the firstly corrupted data chunk s TSN in case that all the data chunks are corrupted; and (2) the successfully recovered (integral) data chunks TSNs in case that some individual chunks are recovered (instead of the corrupted ones). It is noted that on extraction of an implicit corruption item from a SACK chunk, the sender needs to infer which unacknowledged packet has included these chunks and to decide which data chunks need to be retransmitted. Technically, it is easy to identify the corrupted segment as well as the corrupted data chunks, since the sender has only to preserve the contents of all the outstanding packets until they are acknowledged. 3 Error and Congestion Control with CRC Partial Checksums To apply the proposed scheme, the two SCTP endpoints shall negotiate each other to use the partial CRC scheme through the INIT and INIT-ACK chunks in the association establishment phase. Then, in the data transmission phase, the sender will transmit the data packets

7 Partial CRC Checksum of SCTP 253 containing one or more data chunks, together with the corresponding checksum chunk proposed in this paper. In this phase, the sender may adjust the number of data chunks contained in a data packet, depending on the measured packet s corruption rate. For example, when the packet corruption rate decreases down to a pre-configured lower threshold (e.g. 1%), the checksum chunk can not be used any more. Whereas if the packet corruption rate exceeds a pre-specified higher threshold (e.g. 10%), the proposed checksum chunk can be inserted into the packet with multiple data chunks. As stated in Sect. 2.2, the checksum chunk of a single data chunk s segment contains only one partial checksum which indicates whether the packet header is corrupted or not. On the other hand, for a multiple data chunks segment, each respective data chunk has its own partial checksum, in addition to the first partial checksum for the packet s header. It is noted that the SCTP sender needs to keep the mapping of the list of data chunks for each outstanding packet in order to identify the corrupted chunks based on the feedback SACK chunks from the receiver. 3.1 Detection of Corrupted Data Chunks by Receiver On reception of an SCTP segment, the receiver will first verify the integrity of the entire SCTP segment by checking the overall checksum of the common header. In case that the segment is corrupted, the receiver will then verify each partial checksum in turn. Once checking a partial checksum fails, if it is the first one, the receiver has to discard the whole segment since the header portion may contain some wrong information. On the other hand, if the first partial checksum is proven to be valid (i.e., the information of the packet header is valid), the subsequent partial checksums, if any, will be checked in sequence. For each of the subsequent partial checksums (only for the segment with multiple data chunks), if it is proven to be valid, the corresponding data chunk is available and thus recovered from the corrupted segment. The detailed packet processing procedure at the receiver is illustrated in Fig Generation of SACK Chunks by Receiver After checking all of the partial checksums, the SCTP receiver will construct a responding SACK chunk immediately, in which the associated TSNs and timestamp will be contained, as shown in Fig. 3. In particular, if a single data chunk s segment is corrupted, an explicit corruption item will be appended. Otherwise, if the corrupted segment contains multiple data chunks, an implicit corruption item is needed. Herein, the timestamp indicates when the corruption is detected at the receiver side. Therefore, even for the same TSN, a renewed timestamp implies a new corruption event, and thus it requests another prompt retransmission. This allows the sender to retransmit the same chunk multiple times before the retransmission timer expires. By this, the sender can avoid the unwanted timeouts which might be problematic in the conventional SCTP. 3.3 Error Control by Sender In the standard SCTP, both the lost and corrupted chunks will be retransmitted by the timer-based retransmission or the fast retransmission in the same way. In the proposed

8 254 L. Cui, S. J. Koh Fig. 4 Detection of corrupted data chunks in a data packet scheme, however, the corrupted chunk can be processed differently from the loss one, since the corruption itself indicates an explicit retransmission request. By comparing the record of transmitted data packets with the corruption items enclosed in the feedback SACK chunk, the sender can easily infer whether or not a corruption item reports a new corruption event. In case of a new corruption event, the sender will retransmit the corrupted chunks immediately without deflating its congestion window. Figure 5 shows the processing of a SACK chunk by the sender. In the figure, when the sender receives a SACK chunk, it first checks whether there are any corruption items. If no, the sender processes it as normal. If any, the sender further determines whether the first item reports a new corruption event. If it does, then the sender records the corrupted TSNs and timestamp for performing the prompt retransmission. Otherwise, the sender simply ignores it and continues to check the next one. With the help of the corruption items, the sender can adjust its chunk policy based on the measured packet corruption rate. For example, in the network with a higher corruption rate, the sender may contain multiple data chunks with the checksum chunk in the data packet, whereas in the network with a lower corruption rate the data packet may contain only a single data chunk without the checksum chunk. That is, the proposed scheme can be used optionally and selectively together with the standard SCTP. By this, the proposed scheme can significantly improve the throughput performance of SCTP over wireless network with ahighber.

9 Partial CRC Checksum of SCTP 255 Fig. 5 Processing of the SACK chunks Fig. 6 Simulation topology 4 Simulation Results We evaluate the proposed scheme using the ns-2 network simulator (version 2.30) [25] with a simple test topology, as shown in Fig. 6, in which two endpoints communicate through a single path. In the figure, we assume that the bottleneck wireless link has the bandwidth of 2 Mbps and the end-to-end transmission delay is 35 ms. In each experiment, we perform the file transfer application over 200 s and compare the goodput (Kbps) of the standard SCTP with that of the proposed scheme. To emulate packet corruptions, we employ Gilbert model [26] over wireless link, which is modified to add a corruption flag in the corrupted packet s header, as shown in (Fig. 7). In the model, the two states of good and bad are expressed in terms of the average error rates α and β, transition probabilities p and q, and average good period of t1 seconds and bad period of t2 seconds. If the link is in a good state at present, it will continue to stay in the good state with probability p, or transfer to the bad state with a probability 1-p at the next instance. In the Gilbert model, good state means zero error probability. Also, if the link is in a bad state at the current instance, then it will continue to stay in the bad state with probability q, or transfer to the good state with a probability 1-q at the next instance.

10 256 L. Cui, S. J. Koh Fig. 7 Two-state Gilbert model for packet corruption Table 2 Simulation parameters used for Gilbert error model State Average period Transition probability Packet corruption rate Good t1 = 0.5 s p = 0.5, (1 p) = 0.5 α = 0 Bad t2 = 0.5 s (1 q) = 0.5, q = 0.5 β = % Table 3 Packet structures and drop rates Packet drop rate Packet structure Data chunk number Checksum chunk size Data chunk size Packet size β 1 None 1, 468 1,500 58β/ , 456 1,498 70β/ ,494 76β/ ,500 82β/ ,490 8β/ ,492 When the link is in the bad state, a SCTP segment experiences a packet corruption in the network with the probability β. Table2 summarizes the parameter values used for the error model. To identify the corruption rate s thresholds as the criteria on whether or not to employ the checksum chunk option and on how many data chunks are contained in a data packet, we have first compared the standard SCTP with the proposed SCTP for the cases with 1, 2, 3, 4, and 5 data chunks per packet. Notice that in the experiments the standard SCTP uses the fixed-size data chunk (1,468 bytes) and each packet carries only one data chunk. Thus every packet also has a fixed size of 1,500 bytes. Moreover, since the standard SCTP regards a corruption as a loss, all the corrupted packets are dropped by the receiver. Therefore, the packet drop rate is equal to β in the bad states for the standard SCTP. On the contrary, the proposed scheme was evaluated with the variety of size of data chunks and packets. The detailed packet structure information is shown in Table 3. Also, in order to emulate the scenarios where the bit errors occur in the header portion of SCTP packets, the packet drop rate in the bad state is set to the proportion of the header size over the packet size. The detailed packet drop rates are also given in Table 3. Furthermore, in our simulation the number of the erased data chunks contained in a corrupted packet is randomly given. The simulation results are shown in Fig. 8. In the figure, the horizontal axis denotes the packet corruption rate ranged from 0% to 50% (that is β value in the bad state of

11 Partial CRC Checksum of SCTP 257 Fig. 8 Goodputs with different packet corruption rates Gilbert model) and vertical axis indicates the average goodput that is calculated based on the cumulative TSN field contained in the final SACK chunk. From the figure we can see that the standard SCTP without using checksum chunk gives higher goodputs than the cases of employing checksum chunk, only when the packet corruption rate (β value) is smaller than 1.5% roughly. This is because when the packet corruption rate is smaller, the performance gain of the proposed scheme cannot make up the amount of the overhead incurred by the checksum chunk scheme. In addition, the proposed scheme tends to keep the congestion window far larger than the existing scheme by differentiating a corruption event from the loss event. This may sometimes incur the buffer blocking problem at the receiver side. On the other hand, beyond that point, the proposed scheme appears to provide better throughput than the existing scheme. Such performance gain is anticipated since the proposed scheme does not decrease its cwnd and can recover as much available payload from the corrupted packet as possible, whereas the standard SCTP interprets all the corruption events as the network congestion and blindly halves its cwnd repeatedly. In the figure we can also see that too many data chunks (e.g., more than three) may result in some undesirable side effects: (1) overhead caused by too huge checksum chunk as well as too many data chunks headers, (2) much serious receiving buffer blocking problem and (3) raised packet loss rate incurred by header corruption, which will waste the more available bandwidth and decrease the transmission efficiency. Simulation results show that it is desirable to carry 1 or 2 chunks per packet, depending on the packet corruption rates. In particular, when the corruption rate in the bad state (β value) is larger than 15%, the checksum chunk strategy with two data chunks outperforms the strategy with one data chunk. From the results, we can obtain the following observations: (1) we can identify 0.01 as the lower corruption rate s threshold, below which it is better not to use the checksum chunk option; (2) the higher corruption rate s threshold seems to be 0.1, above which the proposed checksum chunk scheme with two data chunks is preferred; and (3) if the sender want to

12 258 L. Cui, S. J. Koh Fig. 9 Performance of SCTP with different chunk policies apply the checksum chunk with a single data chunk, then the estimated corruption ratio lies between the two thresholds. Figure 9 shows the simulation results in which we compare the goodput performance for different chunk policies. From the figure, we can see that the checksum chunk option with a flexible chunk policy outperforms the other approaches with a fixed number of data chunks. This is because the proposed scheme with a flexible chunk policy can overcome the potential problems of the checksum chunk scheme, as described above. 5 Conclusions In this paper, we propose a partial CRC checksum chunk with flexible chunk policy to enhance the SCTP throughput performance under wireless environments. From the simulation results, we can see that the proposed checksum chunk could provide a significant throughput performance gain over the standard SCTP when the packet corruption rate is larger than 1%. It is noted that the performance gain of the proposed scheme comes from the following features. First, the proposed scheme can recover the available data chunks from the corrupted packet and can deliver available in-order data to the upper layer so as to reduce the retransmission amount as much as possible. Second, by checking the corrupted TSN as well as corresponding timestamp enclosed in the responding SACK chunk, the proposed scheme can exploit a robust retransmission policy to avoid the unwanted timeouts. Third, the proposed scheme can distinguish the chunk corruptions from the chunk losses by using additional checksum chunk. Hence, it can avoid unnecessary deflation of the congestion window in the face of packet corruption. Acknowledgements This research was supported by the MKE (Ministry of Knowledge Economy) of Korea, under the ITRC support program supervised by the IITA (IITA-2008-C ). The authors also would like to sincerely thank R. Prasad, the editor in chief, and the anonymous reviewers for their careful reviews and useful suggestions.

13 Partial CRC Checksum of SCTP 259 References 1. Stewart, R., et al. (2000). Stream control transmission protocol. IETF, RFC 2960, October. 2. Fu, S., & Atiquzzaman, M. (2004). SCTP: State of the art in research, products, and technical challenges. IEEE Communications Magazine, 42(4), Grinnemo, K.-J., Andersson, T., & Brunstrom, A. (2005). Performance benefits of avoiding head-of-line blocking in SCTP. In Proceedings of The Joint International Conference on Autonomic/Autonomous Systems (ICAS) International Conference on Networking and Services (ICNS). October Papeete, Tahiti, French Polynesia. 4. Ladha, S., Baucke, S., Ludwig, R., & Amer, P. D. (2004). On making SCTP robust to spurious retransmissions. ACM SIGCOMM Computer Communication Review, 34(2), Iyengar, J., et al. (2003). Making SCTP more robust to changeover. Presented at the International Symposium Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2003). 6. Caro, A. L. Jr., et al. (2004). Retransmission schemes for end-to-end failover with transport layer multihoming. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 04), November 2004, Vol. 3, pp Iyengar, J. R., Amer, P. D., & Stewart, R. (2006). Concurrent multipath transfer using SCTP multihoming over independent end-to-end paths. IEEE/ACM Transactions on Networking, 14, Tonguz, O. K., & Yanmaz, E. (2003). On the theory of dynamic load balancing. In Proceedings IEEE Global Telecommunications Conference (GLOBECOM 03), December 2003, Vol. 7, pp Yanmaz, E., & Tonguz, O. K. (2005). Location dependent dynamic load balancing. In Proceedings IEEE Global Telecommunications Conference (GLOBECOM 05), December Abd El Al, A., Saadawi, T., & Lee, M. (2004). LS-SCTP: A bandwidth aggregation technique for stream control transmission protocol. Computer Communications, 27(10), Allman, M., et al. (1999). TCP congestion control. IETF, RFC 2581, April Wang, D., Yang, S., & Sun, W. (2005). A Mac-error-warning method for SCTP congestion control over high BER wireless network. In Wireless Communications, Networking and Mobile Computing, Proceedings International Conference, September 23 26, 2005, Vol. 1, pp Lin, S., Costello, D. J., & Miller, M. J. (1984). Automatic-repeat-request errorcontrol schemes. IEEE Communications Magazine, 22, Ye, G., Saadawi, T. N., & Lee, M. J. (2004). Improving stream control transmission protocol performance over wireless networks. Selected Areas in Communications, IEEE Journal, 22(4), pp Ramakrishnan, K., et al. (2001). The addition of explicit congestion notification (ECN) to IP. IETF, RFC 3168, September Tickoo, O., Subramanian, V., Kalyanaraman, S., & Ramakrishnan, K. K. (2005). LT-TCP: End-to-end framework to improve TCP performance over networks with lossy channels. In proceedings of IEEE 13th International Workshop on Quality of service (IWQoS), June 21 23, 2005, Passau. 17. Barakat, C., & Altman, E. (2002). Bandwidth tradeoff between TCP and link-level FEC. Computer Networks, 39(5), Barakat, C., & Fawal, A. A. (2004). Analysis of link-level hybrid FEC/ARQ-SR for wireless links and long-lived TCP traffic. Performance Evaluation Journal, 57(4), Baldantoni, L., Lundqvist, H., & Karlsson, G. (2004). Adaptive end-to-end FEC for improving TCP performance over wireless links. ICC 2004, June Balan, R. K., Lee, B. P., Kumar, K. R. R., Jacob, L., Seah, W. K. G., Ananda, A. L. (2001). TCP HACK: TCP header checksum option to improve performance over lossy links. In Proceedings IEEE INFOCOM 2001, April 2001, Vol. 1, pp Balakrishnan,H., & Katz, R. (1998). Explicit loss notification and wireless web performance. In Proceedings IEEE Globecom Internet Mini-Conference, November Allman, M., Glover, D., & Sanchez, L. (1999). Enhancing TCP over satellite channels using standard mechanisms. RFC 2488, January Liu, B., Goeckel, D., & Towsley, D. (2002). TCP-cognizant adaptive forward error correction in wireless networks. In IEEE GLOBECOM 02, November 17 21, 2002, Vol. 3, pp Aguayo, D., Bicket, J., Biswas, S., Judd, G., & Morris, R. (2004). Link-level measurements from an b mesh network. SIGCOMM 2004, August Network Simulator (ns-2), available from Gilbert, E. N. (1960). Capacity of a burst-noise channel. Bell Systems Technical Journal, 39,

14 260 L. Cui, S. J. Koh Author Biographies Lin Cui received B.S. degree in Electronic Engineering from Tianjin University, China, and M.S. degree in Computer Engineering from Kyunghee University, Korea, in 1989 and 2005, respectively. He is now as a Ph.D. candidate with the Department of Computer Science in Kyungpook National University, Korea. His current research interests include Transport Layer Protocols, Wireless Communication and Internet Mobility. Seok Joo Koh received B.S. and M.S. degrees in Management Science from KAIST in 1992 and 1994, respectively. He also received Ph.D. degree in Industrial Engineering from KAIST From August 1998 to February 2004, he worked for Protocol Engineering Center in ETRI. He is now an Associate Professor at Electrical Engineering and Computer Science in the Kyungpook National University since March His current research interests include Mobility Management for NGN, Internet Mobility and Transport Layer Protocols. He has so far participated in the International Standardization as an editor in ITU-T SG19, SG17, SG13, ISO/IEC JTC1/SC6 and IETF.

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

A Cross-layer Approach for Throughput Enhancement in Unsteady Satellite Networks

A Cross-layer Approach for Throughput Enhancement in Unsteady Satellite Networks A Cross-layer Approach for Throughput Enhancement in Unsteady Satellite Networks As a feasible mechanism against link-layer errors, Forward Error Correction (FEC) scheme has been suggested for satellite

More information

Corruption-aware adaptive increase and adaptive decrease algorithm for TCP error and congestion controls in wireless networks

Corruption-aware adaptive increase and adaptive decrease algorithm for TCP error and congestion controls in wireless networks INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2009; 22:543 564 Published online 14 November 2008 in Wiley InterScience (www.interscience.wiley.com)..981 Corruption-aware adaptive

More information

Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks

Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks Journal of Information Processing Systems, Vol.7, No.4, December 2011 http://dx.doi.org/10.3745/jips.2011.7.4.627 Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks Ji-In

More information

A Two-level Threshold Recovery Mechanism for SCTP

A Two-level Threshold Recovery Mechanism for SCTP A Two-level Threshold Recovery Mechanism for SCTP Armando L. Caro Jr., Janardhan R. Iyengar, Paul D. Amer, Gerard J. Heinz Computer and Information Sciences University of Delaware acaro, iyengar, amer,

More information

SCTP Congestion Window Overgrowth During Changeover

SCTP Congestion Window Overgrowth During Changeover SCTP Congestion Window Overgrowth During Changeover Janardhan R. Iyengar, Armando L. Caro, Jr., Paul D. Amer, Gerard J. Heinz Computer and Information Sciences University of Delaware iyengar, acaro, amer,

More information

A Network-Based Handover Scheme in HIP-Based Mobile Networks

A Network-Based Handover Scheme in HIP-Based Mobile Networks J Inf Process Syst, Vol.9, No.4, pp.651~659, December 2013 http://dx.doi.org/10.3745/jips.2013.9.4.651 pissn 1976-913X eissn 2092-805X A Network-Based Handover Scheme in HIP-Based Mobile Networks Moneeb

More information

A Scheme of Primary Path Switching for Mobile Terminals using SCTP Handover

A Scheme of Primary Path Switching for Mobile Terminals using SCTP Handover Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, 2007 218 A Scheme of Primary Path Switching for Mobile Terminals using

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

SCTP over Satellite Networks

SCTP over Satellite Networks SCTP over Satellite Networks Shaojian Fu Mohammed Atiquzzaman School of Computer Science University of Oklahoma, Norman, OK 73019-6151. William Ivancic Satellite Networks & Architectures Branch NASA Glenn

More information

RD-TCP: Reorder Detecting TCP

RD-TCP: Reorder Detecting TCP RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies

More information

A Survey of Recent Developments of TCP. Sally Floyd ACIRI (AT&T Center for Internet Research at ICSI) October 17, 2001

A Survey of Recent Developments of TCP. Sally Floyd ACIRI (AT&T Center for Internet Research at ICSI) October 17, 2001 A Survey of Recent Developments of TCP Sally Floyd ACIRI (AT&T Center for Internet Research at ICSI) October 17, 2001 IEEE Annual Computer Communications Workshop 1 An overview of this session: This talk:

More information

Distributed Mobility Control Schemes in the HIP-based Mobile Networks

Distributed Mobility Control Schemes in the HIP-based Mobile Networks ICACT Transactions on Advanced Communications Technology (TACT) Vol. 2, Issue 4, July 2013 269 Distributed Mobility Control Schemes in the HIP-based Mobile Networks Sang-Il Choi, Seok-Joo Koh School of

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

TCP/IP Protocol Suite 1

TCP/IP Protocol Suite 1 TCP/IP Protocol Suite 1 Stream Control Transmission Protocol (SCTP) TCP/IP Protocol Suite 2 OBJECTIVES: To introduce SCTP as a new transport-layer protocol. To discuss SCTP services and compare them with

More information

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments 24 Telfor Journal, Vol. 6, No. 1, 214. Cross-layer TCP Performance Analysis in IEEE 82.11 Vehicular Environments Toni Janevski, Senior Member, IEEE, and Ivan Petrov 1 Abstract In this paper we provide

More information

Enhancing TCP Throughput over Lossy Links Using ECN-capable RED Gateways

Enhancing TCP Throughput over Lossy Links Using ECN-capable RED Gateways Enhancing TCP Throughput over Lossy Links Using ECN-capable RED Gateways Haowei Bai AES Technology Centers of Excellence Honeywell Aerospace 3660 Technology Drive, Minneapolis, MN 5548 E-mail: haowei.bai@honeywell.com

More information

Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery

Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Raja Abdelmoumen CRISTAL Laboratory, Tunisia Email: Raja.Abdelmoumen@ensi.rnu.tn Chadi Barakat Projet Planète, INRIA-Sophia

More information

Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks

Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks J. lnf. Commun. Converg. Eng. 15(1): 37-42, Mar. 2017 Regular paper Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks Sang-Il Choi 1 and Seok-Joo Koh 2*, Member,

More information

Mean Waiting Delay for Web Object Transfer in Wireless SCTP Environment

Mean Waiting Delay for Web Object Transfer in Wireless SCTP Environment This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 009 proceedings Mean aiting Delay for eb Object Transfer in

More information

ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL

ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL SEIFEDDINE KADRY 1, ISSA KAMAR 1, ALI KALAKECH 2, MOHAMAD SMAILI 1 1 Lebanese University - Faculty of Science, Lebanon 1 Lebanese University - Faculty of Business,

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

An SCTP-Protocol Data Unit with several chunks

An SCTP-Protocol Data Unit with several chunks SCTP for Beginners Section 2 SCTP Packets he protocol data units (PDU) of SCTP are called SCTP packets. If SCTP runs over IP (as described in RFC2960 ), an SCTP packet forms the payload of an IP packet.

More information

Host Identifier and Local Locator for Mobile Oriented Future Internet: Implementation Perspective

Host Identifier and Local Locator for Mobile Oriented Future Internet: Implementation Perspective Host Identifier and Local Locator for Mobile Oriented Future Internet: Implementation Perspective Nak Jung Choi*, Ji In Kim**, Seok Joo Koh* * School of Computer Science and Engineering, Kyungpook National

More information

Considering Spurious Timeout in Proxy for Improving TCP Performance in Wireless Networks

Considering Spurious Timeout in Proxy for Improving TCP Performance in Wireless Networks Considering Spurious Timeout in Proxy for Improving TCP Performance in Wireless Networks YuChul Kim Telecommunication R&D Center, Samsung Electronics,Co., Ltd yuchul.kim@samsung.com DongHo Cho Communication

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Delay Performance of the New Explicit Loss Notification TCP Technique for Wireless Networks

Delay Performance of the New Explicit Loss Notification TCP Technique for Wireless Networks Delay Performance of the New Explicit Loss Notification TCP Technique for Wireless Networks Wenqing Ding and Abbas Jamalipour School of Electrical and Information Engineering The University of Sydney Sydney

More information

Stream Control Transmission Protocol

Stream Control Transmission Protocol Chapter 13 Stream Control Transmission Protocol Objectives Upon completion you will be able to: Be able to name and understand the services offered by SCTP Understand SCTP s flow and error control and

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

msctp for Vertical Handover Between Heterogeneous Networks

msctp for Vertical Handover Between Heterogeneous Networks msctp for Vertical Handover Between Heterogeneous Networks Seok Joo Koh and Sang Wook Kim Department of Computer Science, Kyungpook National University, Daegoo, Korea {sjkoh, swkim}@cs.knu.ac.kr Abstract.

More information

Seamless Multicast Handover in Fmipv6-Based Networks

Seamless Multicast Handover in Fmipv6-Based Networks Seamless Multicast Handover in Fmipv6-Based Networks Moneeb Gohar, Seok Joo Koh, Tae-Won Um, and Hyun-Woo Lee Abstract This paper proposes a fast tree join scheme to provide seamless multicast handover

More information

TCP so far Computer Networking Outline. How Was TCP Able to Evolve

TCP so far Computer Networking Outline. How Was TCP Able to Evolve TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments

More information

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia

More information

Retransmission Policies With Transport Layer Multihoming

Retransmission Policies With Transport Layer Multihoming Retransmission Policies With Transport Layer Multihoming Armando L. Caro Jr., Paul D. Amer, Janardhan R. Iyengar Protocol Engineering Lab Computer and Information Sciences Department University of Delaware

More information

ISSN: Index Terms Wireless networks, non - congestion events, packet reordering, spurious timeouts, reduce retransmissions.

ISSN: Index Terms Wireless networks, non - congestion events, packet reordering, spurious timeouts, reduce retransmissions. ISSN:2320-0790 A New TCP Algorithm to reduce the number of retransmissions in Wireless Networks A Beulah, R Nita Marie Ann Assistant Professsor, SSN College of Engineering, Chennai PG Scholar, SSN College

More information

An Enhanced IEEE Retransmission Scheme

An Enhanced IEEE Retransmission Scheme An Enhanced IEEE 802.11 Retransmission Scheme Hao-Li Wang, Jinghao Miao, J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University haoli, jhmiao, morris@iastate.edu Abstract In

More information

Improving TCP throughput using forward error correction

Improving TCP throughput using forward error correction This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Communications Express, Vol., 1 6 Improving TCP throughput using forward error correction

More information

Analysis of Retransmission Policies for Parallel Data Transmission

Analysis of Retransmission Policies for Parallel Data Transmission Engineering, Technology & Applied Science Research Vol. 8, No. 3, 208, 3079-3083 3079 Analysis of Retransmission Policies for Parallel Data Transmission Imtiaz Ali Halepoto Department of Computer Systems

More information

Chapter 24. Transport-Layer Protocols

Chapter 24. Transport-Layer Protocols Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable

More information

F-RTO: An Enhanced Recovery Algorithm for TCP Retransmission Timeouts

F-RTO: An Enhanced Recovery Algorithm for TCP Retransmission Timeouts F-RTO: An Enhanced Recovery Algorithm for TCP Retransmission Timeouts Pasi Sarolahti Nokia Research Center pasi.sarolahti@nokia.com Markku Kojo, Kimmo Raatikainen University of Helsinki Department of Computer

More information

Reliable transmission of visible light communication data in lighting control networks

Reliable transmission of visible light communication data in lighting control networks IET Networks Research Article Reliable transmission of visible light communication data in lighting control networks ISSN 2047-4954 Received on 12th February 2017 Accepted on 12th March 2017 E-First on

More information

Reliable Transmission for Remote Device Management (RDM) Protocol in Lighting Control Networks

Reliable Transmission for Remote Device Management (RDM) Protocol in Lighting Control Networks Reliable Transmission for Remote Device Management (RDM) Protocol in Lighting Control Networks Sang-Il Choi 1, Sanghun Lee 1, Seok-Joo Koh 1, Sang-Kyu Lim 2, Insu Kim 2, and Tae-Gyu Kang 2 1 Kyungpook

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

Transport Layer TCP / UDP

Transport Layer TCP / UDP Transport Layer TCP / UDP Chapter 6 section 6.5 is TCP 12 Mar 2012 Layers Application Transport Why do we need the Transport Layer? Network Host-to-Network/Physical/DataLink High Level Overview TCP (RFC

More information

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics

More information

Path Selection of SCTP Fast Retransmission in Multi-homed Wireless Environments

Path Selection of SCTP Fast Retransmission in Multi-homed Wireless Environments Path Selection of SCTP Fast Retransmission in Multi-homed Wireless Environments Yuansong Qiao 1, 2, Enda Fallon 1, John Murphy 3, Liam Murphy 3, Austin Hanley 1 1 Applied Software Research Centre, Athlone

More information

Impact of Retransmission Mechanisms on the Performance of SCTP and TCP

Impact of Retransmission Mechanisms on the Performance of SCTP and TCP Impact of Retransmission Mechanisms on the Performance of SCTP and TCP Rumana Alamgir, Mohammed Atiquzzaman School of Computer Science University of Oklahoma, Norman, OK 7319-611, USA. William Ivancic

More information

TCP Congestion Control in Wired and Wireless networks

TCP Congestion Control in Wired and Wireless networks TCP Congestion Control in Wired and Wireless networks Mohamadreza Najiminaini (mna28@cs.sfu.ca) Term Project ENSC 835 Spring 2008 Supervised by Dr. Ljiljana Trajkovic School of Engineering and Science

More information

ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY

ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY L. Donckers, P.J.M. Havinga, G.J.M. Smit, L.T. Smit University of Twente, department of Computer Science, PO Box 217, 7 AE Enschede, the Netherlands

More information

Channel Quality Based Adaptation of TCP with Loss Discrimination

Channel Quality Based Adaptation of TCP with Loss Discrimination Channel Quality Based Adaptation of TCP with Loss Discrimination Yaling Yang, Honghai Zhang, Robin Kravets University of Illinois-Urbana Champaign Abstract TCP responds to all losses by invoking congestion

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

TCP over wireless links

TCP over wireless links CSc 450/550 Computer Communications & Networks TCP over wireless links Jianping Pan (stand-in for Dr. Wu) 1/31/06 CSc 450/550 1 TCP over wireless links TCP a quick review on how TCP works Wireless links

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

CS268: Beyond TCP Congestion Control

CS268: Beyond TCP Congestion Control TCP Problems CS68: Beyond TCP Congestion Control Ion Stoica February 9, 004 When TCP congestion control was originally designed in 1988: - Key applications: FTP, E-mail - Maximum link bandwidth: 10Mb/s

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

Outline. History Introduction Packets Association/ Termination Data Transmission concepts Multihoming Streams

Outline. History Introduction Packets Association/ Termination Data Transmission concepts Multihoming Streams Outline History Introduction Packets Association/ Termination Data Transmission concepts Multihoming Streams 1 History Developed by IETF SIGTRAN working group (Internet Engineering Task Force) (SIGnaling

More information

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A SURVEY ON EXPLICIT FEEDBACK BASED CONGESTION CONTROL PROTOCOLS Nasim Ghasemi 1, Shahram Jamali 2 1 Department of

More information

Q-PMIP: Query-based Proxy Mobile IPv6

Q-PMIP: Query-based Proxy Mobile IPv6 Q-PMIP: Query-based Proxy Mobile IPv6 Jae Wan Park*, Ji In Kim*, Seok Joo Koh* *School of Computer Science and Engineering, Kyungpook National University, Korea jwparkinf8@gmail.com, jiin16@gmail.com,

More information

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Fast Retransmit Problem: coarsegrain TCP timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Sender Receiver

More information

100 Mbps. 100 Mbps S1 G1 G2. 5 ms 40 ms. 5 ms

100 Mbps. 100 Mbps S1 G1 G2. 5 ms 40 ms. 5 ms The Influence of the Large Bandwidth-Delay Product on TCP Reno, NewReno, and SACK Haewon Lee Λ, Soo-hyeoung Lee, and Yanghee Choi School of Computer Science and Engineering Seoul National University San

More information

Subnet Multicast for Delivery of One-to-Many Multicast Applications

Subnet Multicast for Delivery of One-to-Many Multicast Applications Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting

More information

A NEW CONGESTION MANAGEMENT MECHANISM FOR NEXT GENERATION ROUTERS

A NEW CONGESTION MANAGEMENT MECHANISM FOR NEXT GENERATION ROUTERS Journal of Engineering Science and Technology Vol. 3, No. 3 (2008) 265-271 School of Engineering, Taylor s University College A NEW CONGESTION MANAGEMENT MECHANISM FOR NEXT GENERATION ROUTERS MOHAMMED

More information

Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways

Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways Haowei Bai Honeywell Aerospace Mohammed Atiquzzaman School of Computer Science University of Oklahoma 1 Outline Introduction

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

Effect of SCTP Multistreaming over Satellite Links

Effect of SCTP Multistreaming over Satellite Links Effect of SCTP Multistreaming over Satellite Links Mohammed Atiquzzaman (Co-author: William Ivancic (NASA)) School of Computer Science University of Oklahoma. Email: atiq@ieee.org Web: www.cs.ou.edu/~atiq

More information

Analyzing the effect of timer timeout and packet length on the performance of error control protocols

Analyzing the effect of timer timeout and packet length on the performance of error control protocols Analyzing the effect of timer timeout and packet length on the performance of error control protocols Abstract: In the present day computer networks quality of service is a major issue, which invariably

More information

An Extension to the Selective Acknowledgement (SACK) Option for TCP

An Extension to the Selective Acknowledgement (SACK) Option for TCP Network Working Group Request for Comments: 2883 Category: Standards Track S. Floyd ACIRI J. Mahdavi Novell M. Mathis Pittsburgh Supercomputing Center M. Podolsky UC Berkeley July 2000 An Extension to

More information

AVC College of Engineering, Mayiladuthurai, India

AVC College of Engineering, Mayiladuthurai, India Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Recital Investigation

More information

Performance Analysis of TCP LBA and TCP TAHOE Approaches in g Standard Savreet KaurBrar 1, Sandeep Singh Kang 2

Performance Analysis of TCP LBA and TCP TAHOE Approaches in g Standard Savreet KaurBrar 1, Sandeep Singh Kang 2 Performance Analysis of TCP LBA and TCP TAHOE Approaches in 802.11g Standard Savreet KaurBrar 1, Sandeep Singh Kang 2 1 (MTechCSE Student, Chandigarh Engineering College Landran,India) 2 (Associate Professor

More information

Enhanced Mobility Control in Mobile LISP Networks

Enhanced Mobility Control in Mobile LISP Networks Enhanced Mobility Control in Mobile LISP Networks Moneeb Gohar School of Computer Science and Engineering Kyungpook National University Daegu, South Korea moneebgohar@gmail.com Ji In Kim School of Computer

More information

Multiple unconnected networks

Multiple unconnected networks TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum

More information

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of

More information

Topics in Computer Networking Switch SS7 PSTN/ISDN. Gatekeeper/ Proxy Server. Topics in Computer Networking Н.

Topics in Computer Networking Switch SS7 PSTN/ISDN. Gatekeeper/ Proxy Server. Topics in Computer Networking Н. Outline SCTP Stream Control Transmission Protocol NGN and Motivation for SCTP Protocol Overview Packet format Protection against SYN Flooding Multistreaming Multihoming Research Activities at Kau Summary

More information

A Survey of the Stream Control Transmission Protocol

A Survey of the Stream Control Transmission Protocol A Survey of the Stream Control Transmission Protocol Sivadon Chaisiri Parallel and Distributed Computing Centre (PDCC) School of Computer Engineering Nanyang Technological University, Singapore Email:

More information

Simulation of the SCTP Failover Mechanism

Simulation of the SCTP Failover Mechanism Simulation of the SCTP Failover Mechanism M Minnaar, DW Ngwenya, and WT Penzhorn Telkom, NNOC Tier 2 University of Pretoria, South Africa University of Pretoria, South Africa minnaarm@telkom.co.za; dumisa.ngwenya@eng.up.ac.za;

More information

Fast Device Discovery for Remote Device Management in Lighting Control Networks

Fast Device Discovery for Remote Device Management in Lighting Control Networks J Inf Process Syst, Vol.10, No.4, pp.00~00, December 2014 http://dx.doi.org/10.3745/jips.03.0011 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Fast Device Discovery for Remote Device Management in

More information

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Hong-rae Lee, Tae-jun Jung, Kwang-deok Seo Division of Computer and Telecommunications Engineering

More information

Programming Assignment 3: Transmission Control Protocol

Programming Assignment 3: Transmission Control Protocol CS 640 Introduction to Computer Networks Spring 2005 http://www.cs.wisc.edu/ suman/courses/640/s05 Programming Assignment 3: Transmission Control Protocol Assigned: March 28,2005 Due: April 15, 2005, 11:59pm

More information

TCP is the most important transport protocol today, providing

TCP is the most important transport protocol today, providing End-to-End Coding for TCP Yong Cui, Lian Wang, Xin Wang, Yisen Wang, Fengyuan Ren, and Shutao Xia Abstract Although widely used, TCP has many limitations in meeting the throughput and latency requirements

More information

Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links

Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links Satoshi Ohzahata and Konosuke Kawashima Department of Computer, Information and Communication Sciences, Tokyo

More information

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification Chunlei Liu Raj Jain Department of Computer and Information Science The Ohio State University, Columbus, OH 432-277

More information

IFTP-W: A TCP-Friendly Protocol for Multimedia Applications over Wireless Networks

IFTP-W: A TCP-Friendly Protocol for Multimedia Applications over Wireless Networks -W: A -Friendly Protocol for Multimedia Applications over Wireless Networks Hala ElAarag Andrew Moedinger Department of Mathematics and Computer Science Stetson University DeLand, Florida, U.S.A. Email:

More information

Approaches of Wireless TCP Enhancement and A New Proposal Based on Congestion Coherence

Approaches of Wireless TCP Enhancement and A New Proposal Based on Congestion Coherence Approaches of Wireless TCP Enhancement and A New Proposal Based on Congestion Coherence Chunlei Liu Lucent Technologies E Broad St, Columbus, OH 33 liu.3@osu.edu Raj Jain Department of Computer and Information

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control

More information

Performance Evaluation of SCTP with Adaptive Multistreaming over LEO Satellite Networks

Performance Evaluation of SCTP with Adaptive Multistreaming over LEO Satellite Networks Performance Evaluation of SCTP with Adaptive Multistreaming over LEO Satellite Networks Hiroshi Tsunoda, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto Graduate School of Information Sciences, Tohoku

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

DualRTT: Enhancing TCP Performance During Delay Spikes

DualRTT: Enhancing TCP Performance During Delay Spikes DualRTT: Enhancing TCP Performance During Delay Spikes Ph.D. School of Computer Science University of Oklahoma. Email: atiq@ieee.org Web: www.cs.ou.edu/~atiq Presentation at Tohoku University, Sendai,

More information

CS 640 Introduction to Computer Networks Spring 2009

CS 640 Introduction to Computer Networks Spring 2009 CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,

More information

A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS

A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS S.P.Valli 1,K.M.Mehata 2 1 vallisp@yahoo.com Department of Computer Science and Engineering B.S.Abdur Rahman University,Chennai. 2 kmmehata@bsauniv.ac.in

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

Timestamp Retransmission Algorithm for TCP-Cherry over InterPlaNetary Internet

Timestamp Retransmission Algorithm for TCP-Cherry over InterPlaNetary Internet Network and Communication Technologies; Vol. 1, No. 2; 2012 ISSN 1927-064X E-ISSN 1927-0658 Published by Canadian Center of Science and Education Timestamp Retransmission Algorithm for TCP-Cherry over

More information

MULTIHOMING AND MULTISTREAM PROTOCOL IN COMPUTER NETWORKS

MULTIHOMING AND MULTISTREAM PROTOCOL IN COMPUTER NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

Improving TCP End to End Performance in Wireless LANs with Snoop Protocol

Improving TCP End to End Performance in Wireless LANs with Snoop Protocol Improving TCP End to End Performance in Wireless LANs with Snoop Protocol Dejan Jaksic, Zeljko Ilic and Alen Bazant Department of Telecommunications, Faculty of Electrical Engineering and Computing Unska

More information

under grant CNS This work was supported in part by the National Science Foundation (NSF)

under grant CNS This work was supported in part by the National Science Foundation (NSF) Coordinated Multi-Layer Loss Recovery in TCP over Optical Burst-Switched (OBS) Networks Rajesh RC Bikram, Neal Charbonneau, and Vinod M. Vokkarane Department of Computer and Information Science, University

More information

Variable Step Fluid Simulation for Communication Network

Variable Step Fluid Simulation for Communication Network Variable Step Fluid Simulation for Communication Network Hongjoong Kim 1 and Junsoo Lee 2 1 Korea University, Seoul, Korea, hongjoong@korea.ac.kr 2 Sookmyung Women s University, Seoul, Korea, jslee@sookmyung.ac.kr

More information

Lecture 4: Congestion Control

Lecture 4: Congestion Control Lecture 4: Congestion Control Overview Internet is a network of networks Narrow waist of IP: unreliable, best-effort datagram delivery Packet forwarding: input port to output port Routing protocols: computing

More information

A Report on Some Recent Developments in TCP Congestion Control

A Report on Some Recent Developments in TCP Congestion Control A Report on Some Recent Developments in TCP Congestion Control Sally Floyd June 5, 2000 Abstract This paper discusses several changes either proposed or in progress for TCP congestion control. The changes

More information